default search action
Hyung Tae Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j18]Chanhyeok Park, Sangrae Cho, Young-Seob Cho, Soohyung Kim, Hyung Tae Lee:
Insecurity of Chait et al.'s RSA-Based Aggregate Signature Scheme. IEEE Access 12: 16462-16473 (2024) - 2023
- [j17]Hyung Tae Lee:
Cryptanalysis of Zhu et al.'s Identity-Based Encryption With Equality Test Without Random Oracles. IEEE Access 11: 84533-84542 (2023) - [j16]Hyung Tae Lee, Jae Hong Seo:
On the security of functional encryption in the generic group model. Des. Codes Cryptogr. 91(9): 3081-3114 (2023) - 2022
- [j15]Myungsun Kim, Sangrae Cho, Seongbong Choi, Young-Seob Cho, Soohyung Kim, Hyung Tae Lee:
A Key Recovery Protocol for Multiparty Threshold ECDSA Schemes. IEEE Access 10: 133206-133218 (2022) - [j14]Seongbong Choi, Hyung Tae Lee:
Attack and improvement of the recent identity-based encryption with authorized equivalence test in cluster computing. Clust. Comput. 25(1): 633-646 (2022) - 2021
- [j13]Benjamin Hong Meng Tan, Hyung Tae Lee, Huaxiong Wang, Shu Qin Ren, Khin Mi Mi Aung:
Efficient Private Comparison Queries Over Encrypted Databases Using Fully Homomorphic Encryption With Finite Fields. IEEE Trans. Dependable Secur. Comput. 18(6): 2861-2874 (2021) - 2020
- [j12]Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang, Taek-Young Youn:
Public key encryption with equality test in the standard model. Inf. Sci. 516: 89-108 (2020) - [j11]Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen, Huaxiong Wang:
Provably Secure Group Signature Schemes From Code-Based Assumptions. IEEE Trans. Inf. Theory 66(9): 5754-5773 (2020) - 2019
- [j10]Myungsun Kim, Hyung Tae Lee:
Experimenting With Non-Interactive Range Proofs Based on the Strong RSA Assumption. IEEE Access 7: 117505-117516 (2019) - [j9]Myungsun Kim, Hyung Tae Lee, San Ling, Shu Qin Ren, Benjamin Hong Meng Tan, Huaxiong Wang:
Search Condition-Hiding Query Evaluation on Encrypted Databases. IEEE Access 7: 161283-161295 (2019) - [j8]Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang:
Public key encryption with equality test from generic assumptions in the random oracle model. Inf. Sci. 500: 15-33 (2019) - [j7]Kai Zhang, Jie Chen, Hyung Tae Lee, Haifeng Qian, Huaxiong Wang:
Efficient public key encryption with equality test in the standard model. Theor. Comput. Sci. 755: 65-80 (2019) - [j6]Khin Mi Mi Aung, Hyung Tae Lee, Benjamin Hong Meng Tan, Huaxiong Wang:
Fully homomorphic encryption over the integers for non-binary plaintexts without the sparse subset sum problem. Theor. Comput. Sci. 771: 49-70 (2019) - [j5]Myungsun Kim, Hyung Tae Lee, San Ling, Benjamin Hong Meng Tan, Huaxiong Wang:
Private Compound Wildcard Queries Using Fully Homomorphic Encryption. IEEE Trans. Dependable Secur. Comput. 16(5): 743-756 (2019) - 2018
- [j4]Myungsun Kim, Hyung Tae Lee, San Ling, Huaxiong Wang:
On the Efficiency of FHE-Based Private Queries. IEEE Trans. Dependable Secur. Comput. 15(2): 357-363 (2018) - 2016
- [j3]Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang:
CCA2 Attack and Modification of Huang et al.'s Public Key Encryption with Authorized Equality Test. Comput. J. 59(11): 1689-1694 (2016) - [j2]Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang:
Semi-generic construction of public key encryption and identity-based encryption with equality test. Inf. Sci. 373: 419-440 (2016) - [j1]Hyung Tae Lee, San Ling, Huaxiong Wang:
Analysis of Gong et al.'s CCA2-secure homomorphic encryption. Theor. Comput. Sci. 640: 104-114 (2016)
Conference and Workshop Papers
- 2024
- [c27]Chanhyeok Park, Seongbong Choi, Yongseok Son, Jeongyeup Paek, Sungrae Cho, Hyung Tae Lee:
New RSA-Based Public Key Encryption with Authorized Equality Test. ICOIN 2024: 299-304 - [c26]Manh Dat Tran, Lan Anh Nguyen, Hyung Tae Lee, Jeongyeup Paek, Sungrae Cho, Yongseok Son:
A Survey on Copy-on-Write File Systems. ICTC 2024: 436-441 - [c25]Taehwan Ahn, Munhyeong Choi, Hyung Tae Lee, Jeongyeup Paek, Sungrae Cho, Yongseok Son:
A Survey on Metadata Management in File Systems. ICTC 2024: 442-447 - [c24]Sunwoo Bang, Chaeyeong Lee, Junhyeong Ryu, Hyung Tae Lee, Jeongyeup Paek:
Trend Shift in Pose Estimation: Toward Continuous Representation. ICTC 2024: 465-468 - [c23]Chanhyeok Park, Yongseok Son, Jeongyeup Paek, Sungrae Cho, Hyung Tae Lee:
A Survey of Oblivious Compression on Encrypted Data with Fully Homomorphic Encryption. ICTC 2024: 474-479 - [c22]Seunghu Kim, Yongseok Son, Jeongyeup Paek, Sungrae Cho, Hyung Tae Lee:
A Survey of Blind Sorting Techniques: Approaches Using Fully Homomorphic Encryption. ICTC 2024: 480-485 - [c21]Jaemin Kim, Hyosu Kim, Jeongyeup Paek, Yongseok Son, Hyung Tae Lee, Sungrae Cho:
Survey on Online Learning Applications in Multi-UAV Networks. ICTC 2024: 738-739 - [c20]Donghyeon Hur, Jeongyeup Paek, Yongseok Son, Hyung Tae Lee, Hyosu Kim, Sungrae Cho:
A Survey on Fairness Optimization Techniques in RSMA Networks. ICTC 2024: 740-741 - [c19]Gahyun Kim, Hyosu Kim, Jeongyeup Paek, Yongseok Son, Hyung Tae Lee, Sungrae Cho:
Efficient Resource Allocation Algorithms in Satellite Edge Computing: A Survey. ICTC 2024: 742-743 - [c18]Seonghun Hong, Jeongyeup Paek, Yongseok Son, Hyung Tae Lee, Hyosu Kim, Sungrae Cho:
Investigating Strategic Trends for Energy Efficiency in NOMA-UAV Networks. ICTC 2024: 744-746 - [c17]Dongwook Won, Hyosu Kim, Jeongyeup Paek, Yongseok Son, Hyung Tae Lee, Sungrae Cho:
Semantic-Aware Offloading in Mobile Edge Computing: A Survey. ICTC 2024: 747-748 - [c16]Chihyun Song, Jeongyeup Paek, Yongseok Son, Hyung Tae Lee, Hyosu Kim, Sungrae Cho:
A Review on Scalable Cell-Free Massive MIMO with Learning Approach. ICTC 2024: 1751-1752 - 2023
- [c15]Minkyu Kim, Hyung Tae Lee:
Code-Based Secret Handshake Scheme, Revisited. ESORICS (1) 2023: 106-125 - [c14]Jaehyung Ahn, Junhong Min, Hyung Tae Lee, Jeongyeup Paek:
Unified Framework for End-User Authentication Protocol in Feature-as-a-Service Models. ICTC 2023: 539-542 - [c13]Arooj Masood, Nhu-Ngoc Dao, Hyosu Kim, Yongseok Son, Hyung Tae Lee, Jeongyeup Paek, Sungrae Cho:
A Review on AI-Enabled Congestion Control Schemes for Content Centric Networks. ICTC 2023: 659-662 - [c12]Quang Tuan Do, Anh-Tien Tran, Demeke Shumeye Lakew, Hyosu Kim, Yongseok Son, Hyung Tae Lee, Jeongyeup Paek, Sungrae Cho:
UAV-Satellite Integration for Communication System: Potential Applications and Key Challenges. ICTC 2023: 663-665 - [c11]Seongbong Choi, Yongseok Son, Jeongyeup Paek, Hyung Tae Lee:
Experimental Analysis of the Recent Key Recovery Protocol with respect to Commitment Schemes. ICTC 2023: 669-674 - [c10]Lan Anh Nguyen, Sangjin Lee, Hyung Tae Lee, Yongseok Son:
A Survey on Epoch-based In-Memory Database Systems. ICTC 2023: 788-792 - 2022
- [c9]Seongbong Choi, Hyung Tae Lee:
Known Plaintext Attacks on the Omar and abed Homomorphic Encryption Scheme. ICTC 2022: 1154-1157 - 2021
- [c8]Sunpill Kim, Yunseong Jeong, Jinsu Kim, Jungkon Kim, Hyung Tae Lee, Jae Hong Seo:
IronMask: Modular Architecture for Protecting Deep Face Template. CVPR 2021: 16125-16134 - 2018
- [c7]Hyung Tae Lee, Huaxiong Wang, Kai Zhang:
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017. ACISP 2018: 780-786 - 2015
- [c6]Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen, Huaxiong Wang:
A Provably Secure Group Signature Scheme from Code-Based Assumptions. ASIACRYPT (1) 2015: 260-285 - 2014
- [c5]Jung Hee Cheon, Hyung Tae Lee, Jae Hong Seo:
A New Additive Homomorphic Encryption based on the co-ACD Problem. CCS 2014: 287-298 - [c4]Hyung Tae Lee, Jae Hong Seo:
Security Analysis of Multilinear Maps over the Integers. CRYPTO (1) 2014: 224-240 - 2013
- [c3]Jung Hee Cheon, Hyunsook Hong, Hyung Tae Lee:
Invertible Polynomial Representation for Private Set Operations. ICISC 2013: 277-292 - 2011
- [c2]Hyung Tae Lee, HongTae Kim, Yoo-Jin Baek, Jung Hee Cheon:
Correcting Errors in Private Keys Obtained from Cold Boot Attacks. ICISC 2011: 74-87 - [c1]Myungsun Kim, Hyung Tae Lee, Jung Hee Cheon:
Mutual Private Set Intersection with Linear Complexity. WISA 2011: 219-231
Informal and Other Publications
- 2024
- [i15]Jiseung Kim, Hyung Tae Lee, Yongha Son:
Revisiting Shuffle-Based Private Set Unions with Reduced Communication. IACR Cryptol. ePrint Arch. 2024: 1560 (2024) - 2021
- [i14]Sunpill Kim, Yunseong Jeong, Jinsu Kim, Jungkon Kim, Hyung Tae Lee, Jae Hong Seo:
IronMask: Modular Architecture for Protecting Deep Face Template. CoRR abs/2104.02239 (2021) - 2020
- [i13]Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang:
Insecurity of the Public Key Encryption with Filtered Equality Test Proposed by Huang et al. IACR Cryptol. ePrint Arch. 2020: 749 (2020) - 2019
- [i12]Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen, Huaxiong Wang:
Provably Secure Group Signature Schemes from Code-Based Assumptions. CoRR abs/1909.04472 (2019) - [i11]Benjamin Hong Meng Tan, Hyung Tae Lee, Huaxiong Wang, Shu Qin Ren, Khin Mi Mi Aung:
Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields. IACR Cryptol. ePrint Arch. 2019: 332 (2019) - 2018
- [i10]Hyung Tae Lee, Huaxiong Wang, Kai Zhang:
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017. IACR Cryptol. ePrint Arch. 2018: 369 (2018) - 2016
- [i9]Hyung Tae Lee, San Ling, Huaxiong Wang:
Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2016: 19 (2016) - [i8]Myungsun Kim, Hyung Tae Lee, San Ling, Shu Qin Ren, Benjamin Hong Meng Tan, Huaxiong Wang:
Better Security for Queries on Encrypted Databases. IACR Cryptol. ePrint Arch. 2016: 470 (2016) - [i7]Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang, Taek-Young Youn:
Public Key Encryption with Equality Test in the Standard Model. IACR Cryptol. ePrint Arch. 2016: 1182 (2016) - 2015
- [i6]Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen, Huaxiong Wang:
A Provably Secure Group Signature Scheme from Code-Based Assumptions. IACR Cryptol. ePrint Arch. 2015: 479 (2015) - [i5]Myungsun Kim, Hyung Tae Lee, San Ling, Huaxiong Wang:
On the Efficiency of FHE-based Private Queries. IACR Cryptol. ePrint Arch. 2015: 1176 (2015) - 2014
- [i4]Hyung Tae Lee, Jae Hong Seo:
Security Analysis of Multilinear Maps over the Integers. IACR Cryptol. ePrint Arch. 2014: 574 (2014) - 2012
- [i3]Hyung Tae Lee, Hyunsook Hong, Jung Hee Cheon:
Invertible Polynomial Representation for Private Set Operations. IACR Cryptol. ePrint Arch. 2012: 526 (2012) - 2011
- [i2]Hyung Tae Lee, Jung Hee Cheon, Jin Hong:
Analysis of Discrete Logarithm Algorithm using Pre-computation. IACR Cryptol. ePrint Arch. 2011: 187 (2011) - [i1]Myungsun Kim, Hyung Tae Lee, Jung Hee Cheon:
Mutual Private Set Intersection with Linear Complexity. IACR Cryptol. ePrint Arch. 2011: 267 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-29 21:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint